You need to apply the security template to all Web servers in the perimeter network
Your company has an Active Directory directory service domain with a single site. All servers run Windows Server 2003. All Web servers run IIS 6.0. Web servers on the internal network are member servers. Web servers in the perimeter network (also known as DMZ) are stand-alone servers. All Web servers on the internal network are located in a single organizational unit (OU). You create a security template for Web servers. You need to apply the security template to all Web servers in the perimeter network.
What should you do?
achieve this goal? (Each correct answer presents a complete solution
You are the network administrator for your company. The network consists of a single Active Directory
domain. All servers run Windows Server 2003. The company decides to make five Windows XP
Professional computers available in a public area for use by visitors. These computers are to be used only
for browsing public Web sites. A Web browser is the only application that will be run on these computers.
You make these computers members of the Active Directory domain. You create a new organizational unit
(OU) named Restricted Computers and place the five computer accounts in this OU. You configure these
computers to automatically log on a user named Restricted User each time the computer is started. The
Restricted User account does not have administrative rights on the computer or on the domain. You need to
configure the five computers so that they can access public Web sites but cannot run other applications.
The restrictions must not affect other users or computers on the network. What are two possible ways to
achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Which protocol should you use?
All servers in your environment run Windows Server 2003. Your network is divided into several IP subnets that are connected by dedicated routers. You plan to install new Routing and Remote Access service (RRAS) servers to replace the existing routers. You need to enable a routing protocol on the RRAS servers that uses link state in route decision making and supports variable- length subnet masks.
Which protocol should you use?
You need to create a plan for creating e-mail groups for your company
You are the network administrator for your company. The network consists of a single Active Directory forest. The forest consists of 19 Active Directory domains. Fifteen of the domains contain Windows Server 2003 domain controllers. The functional level of all the domains is Windows 2000 native. The network also consists of a single Microsoft Exchange 2000 Server organization. You need to create groups that can be used only to send e-mail messages to user accounts throughout the company. You want to achieve this goal by using the minimum amount of replication traffic and minimizing the size of the Active Directory database. You need to create a plan for creating e-mail groups for your company. What should you do?
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution
A server that runs Windows Server 2003 acts as a stand-alone certification authority (CA). You create a local group named Key Recovery Team, and you add user accounts to the local group. You need to ensure that members of the Key Recovery Team group can recover archived private keys for users.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution
Your company has a single Active Directory directory service forest. All user accounts are located in the Users container. You need to create a number of organizational units (OUs) that will be used to store user accounts. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Which type of tool should you use?
All servers in your environment run Windows Server 2003. You need to configure a server to automatically send a network message when its Average Disk Queue Length setting exceeds a specific value.
Which type of tool should you use?
You need to prevent the GPO from applying to any user account that is a member of the Management group, unless
You are the network administrator for your company. Your network consists of a single Active Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the Accounting OU. You configure the GPO to disable the display options under the User Configuration section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to all user accounts that are members of the Processors group. You need to prevent the GPO from applying to any user account that is a member of the Accountants group. You need to prevent the GPO from applying to any user account that is a member of the Management group, unless the user account is also a member of the Processors group.What should you do?
Which type of backup should you schedule?
Your company has a file server that runs Windows Server 2003. You are planning a backup and recovery strategy for the file server. You have the following requirements. Back up the file server nightly. Minimize the disk space that is used by the backups. Ensure that you can restore the file server data to any backup point within the past 7 days. You schedule a normal backup to run weekly. You need to schedule an additional nightly backup that supports the requirements.
Which type of backup should you schedule?
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution
Your network consists of Windows XP computers in a single Active Directory directory service domain. All computers are located in a single Active Directory site. You need to design and deploy a new Group Policy object (GPO) that automatically installs a custom application on computers. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
